Rig Exploit Kit via the EiTest delivers CryptFile2 ransomware from 194.87.234.70

NOTES:

I have added a zipped pcap file for your analysis. The password for the zipped pcap is infected all lowercase.

PCAP file of the infection traffic:
2016-11-8-Rig-EK-pcap.zip

 

ASSOCIATED DOMAINS AND IP ADDRESSES:

  • dogfoodchat.com – COMPROMISED SITE
  • 194.87.234.70 – add.stitchforstitch.com – RIG EK LANDING PAGE
  • 195.154.117.218 – GET /updatemicrosoft.php –CRYPTFILE2 POST TRAFFIC
  • 195.154.117.218 – POST /config/infoconfig.php –CRYPTFILE2 POST TRAFFIC

ASSOCIATED EMAILS FOR RANSOM PAYMENT:

E-MAIL1: enc7@usa.com
E-MAIL2: enc7@dr.com

 

IMAGES AND DETAILS OF INFECTION CHAIN:

Shown above: Network traffic  associated with the Rig exploit and the delivery of CryptFile2 ransomware

 

Shown above: Injected script found on index page of compromised site associated with the EiTest campaign which redirects visitors to the Rig EK landing page – Web page source code can be found by right clicking on web page and selecting “View source”

 

Shown above: Fiddler used to show each stage of infection chain

 

Shown above: Fiddler used to decode script found on Rig EK landing page.

 

Shown above: Post infection traffic associated with CryptFile 2 ransomware infection

 

Shown above: HELP_DECRYPT_YOUR_FILES.TXT ransom note and payment instruction associated with CryptFile2 ransomware

 

MALICIOUS PAYLOAD ASSOCIATED WITH RIG EXPLOIT: